LeakedIn Logo
Stories About Data Leaks and Related Stuff

Potential leak of data: CVE Reference

0 votedvote

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}':

portal/\nDisallow: /gcc/\nDisallow: /aclk\nDisallow: /cse?"}, "ip_str": "173.194.42.17"}], "asn": "AS15169", "city": "Mountain View", "isp": "Google", "longitude": -122.0574, "last_update": "2014-11-30T21:50:28.577431", "country_code3": "USA", "vulns": ["!CVE-2014-0160"], "country_name": "United States", "ip_str": "173.194.42.17", "os": null, "ports": [443, 80]}

Source: http://pastebin.com/raw.php?i=XFNz003X

Potential leak of data: List of Twitter Accounts

0 votedvote

Detected 24 occurrence(s) of ‘http[s]*://[w\.]*twitter\.com/\S+':

tps://twitter.com/ae_elkashef	1500
https://twitter.com/dhefafharf	500
https://twitter.com/hureyaksa	24100
https://twitter.com/StepfordWife_	1000
https://twitter.com/scingecom	24100
https://twitter.com/2z72	4000
https://twitter.com/kamranhooman	1000
https://twitter.com/ozlemsuyev	10000

Source: http://pastebin.com/raw.php?i=Fq3G4ZP5

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]':

nager.registerDriver(new oracle.jdbc.OracleDriver());
                String url = "jdbc:oracle:thin:@db.student.chalmers.se:1521/kingu.ita.chalmers.se";
                String userName = "htda357_073"; // Your username goes here!
                String password = "htda357_073"; // Your password goes here!*/
                Connection conn = DriverManager.getConnection(url, userName, password);


                String student = args[0]; // This is the identifier for the student.

                BufferedReader input = new

Detected 1 occurrence(s) of ‘dbc:oracle:thin:':

 public static void main(String[] args)
    {
        if (args.length == 1) {
            try {

                //Connects to the database
                DriverManager.registerDriver(new oracle.jdbc.OracleDriver());
                String url = "jdbc:oracle:thin:@db.student.chalmers.se:1521/kingu.ita.chalmers.se";
                String userName = "htda357_073"; // Your username goes here!
                String password = "htda357_073"; // Your password goes here!*/
                Connection conn = DriverMana

Source: http://pastebin.com/raw.php?i=2nE83vB7

Potential leak of data: Simple Password

0 votedvote

Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]':

profile=user.profile, type=Balance.TYPE_COMPANY)
        payer = Payer.default_manager.create(balance=balance, short_name='ООО "ТрындецИнк')

        self.assertEqual(payer.payerdocument_set.count(), 0)
        self.client.login(username=user.username, password='111')

        url = reverse('api.v1:billing:payer_document_add', kwargs={'payer_id': payer.id})

        img_file_path_2 = get_asset_path('user_picture_2.jpg')
        img_content = open(img_file_path_2, 'rb').read()

        data = {'files': ['jpg {}'

Source: http://pastebin.com/raw.php?i=ccFFiZiW

Potential leak of data: IP Addresses List

0 votedvote

Detected 24 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$':

1

Call-ID: 8eff12ee-b2df63fc@192.168.0.190

Contact: <sip:113@95.6.60.177:5060>

Max-Forwards: 70

User-Agent: talksPBX

CSeq: 101 INVITE

Content-Type: application/sdp

Content-Length: 209



v=0

o=- 36 928 IN IP4 95.6.60.177

s=PCBEST_SIP_SDK

c=IN IP4 95.6.60.177

t=0 0

m=audio 9000 RTP/AVP 0 101

a=rtpmap:0 PCMU/8000

a=rtpmap:101 telephone-event/8000

a=fmtp:101 0-16

a=ptime:20

a=sendrecv

]
  [2014-12-18 17:32:42] Dialog Count(in sending):3
  [2014-12-18 17:32:42] Send to 192.168.0.190:5061 
387 Bytes Data:

Source: http://pastie.org/pastes/9788344/download